58.4 F
Washington D.C.
Sunday, April 28, 2024

NSA and CISA Best Practices to Secure Cloud Continuous Integration/Continuous Delivery Environments

The CI/CD pipeline is a key part of the DevSecOps approach that integrates security and automation throughout the development lifecycle.

Software development and delivery supply chains are attractive targets for malicious cyber actors. They can use these environments to compromise cloud deployments throughout the automated software development and delivery lifecycle.

The National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA) are publicly releasing a Cybersecurity Information Sheet (CSI) – “Defending Continuous Integration/Continuous Delivery (CI/CD) Environments” to provide recommendations for integrating security best practices into typical software development and operations (DevOps) CI/CD environments. The agencies encourage organizations to use the best practices to harden their CI/CD cloud deployments.

“The virtual cloud environment relies on software, making development and delivery a crucial component of providing services in the cloud,” said Dr. Ethan Givens, NSA’s Technical Director, Critical & Emerging Technologies. “Failure to effectively defend the CI/CD pipeline can provide an attack vector that circumvents security policies and products.”

Typical DevOps CI/CD environments are attractive targets for malicious cyber actors. They can compromise information through the introduction of malicious code into CI/CD applications, gain access to intellectual property/trade secrets through code theft, or cause denial of service effects against applications.

DevOps is a methodology that combines software development and information technology (IT) operations. It is used to shorten the software development lifecycle and provide continuous delivery of high quality products. When integrating security into DevOps, the methodology is called DevSecOps.

The CI/CD pipeline is a key part of the DevSecOps approach that integrates security and automation throughout the development lifecycle.  It focuses on automating the integration and delivery of applications securely, quickly, and efficiently. CI/CD pipelines are often implemented in commercial cloud environments. Organizations use DevSecOps CI/CD tools and services to securely streamline software development and manage applications and cloud programmable infrastructure.

Recommendations in the CSI for hardening CI/CD pipelines include best practices for authentication and access control, development environments and tools, and the development process as a whole. NSA and CISA recommend organizations and network defenders implement the mitigations in this CSI to reduce compromise of their CI/CD environments and create a challenging environment for malicious cyber actors.

Read the full report here.

Visit our full library for more cybersecurity information and technical guidance.

Read more at NSA

author avatar
Homeland Security Today
The Government Technology & Services Coalition's Homeland Security Today (HSToday) is the premier news and information resource for the homeland security community, dedicated to elevating the discussions and insights that can support a safe and secure nation. A non-profit magazine and media platform, HSToday provides readers with the whole story, placing facts and comments in context to inform debate and drive realistic solutions to some of the nation’s most vexing security challenges.
Homeland Security Today
Homeland Security Todayhttp://www.hstoday.us
The Government Technology & Services Coalition's Homeland Security Today (HSToday) is the premier news and information resource for the homeland security community, dedicated to elevating the discussions and insights that can support a safe and secure nation. A non-profit magazine and media platform, HSToday provides readers with the whole story, placing facts and comments in context to inform debate and drive realistic solutions to some of the nation’s most vexing security challenges.

Related Articles

Latest Articles